Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Digital Forensic Survival Podcasts
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
…
continue reading

1
From Combat Boots to Cybersecurity - Nia Luckey on her journey
53:08
53:08
Play later
Play later
Lists
Like
Liked
53:08In this episode of the Cybersecurity America Podcast, sponsored by DarkStack7, host Joshua Nicholson sits down with Nia Luckey — Army veteran, published author, and cybersecurity leader — to talk about her powerful journey from military service to the frontlines of cyber defense. Nia shares lessons on resilience, leadership, and transitioning from …
…
continue reading

1
Cybersecurity’s Golden Rule: The Legal Blueprint No One Shares
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07In this episode, sponsored by Darkstack7, Joshua sits down with Chris Cronin, partner at Halock Security Labs and founding partner of Reasonable Risk, to explore the intersection of cybersecurity, risk management, and the legal principles behind “reasonable” safeguards. Chris unpacks the DoCRA Standard and CIS RAM, sharing how historical and legal …
…
continue reading
…
continue reading
…
continue reading
…
continue reading
…
continue reading

1
Memory-Only Malware: The Threat You’re Probably Missing
51:27
51:27
Play later
Play later
Lists
Like
Liked
51:27In episode 39, host Josh Nicholson is joined by memory forensics expert Andrew Case, co-developer of the Volatility framework and co-author of The Art of Memory Forensics. Together, they explore the critical role of memory analysis in modern incident response—uncovering hidden malware, insider threats, and ransomware techniques invisible to traditi…
…
continue reading

1
DFSP # 491 INF-ltration: The Subtle Art of “Fetch and Execute”
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47
…
continue reading
…
continue reading
…
continue reading
…
continue reading

1
Digital Forensics & Incident Response (DFIR) with Surefire Cyber.
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42Cyber threats aren't slowing down—and neither are we. In episode 38 of Cyber Security America, I sit down with two powerhouses from Surefire Cyber—Karla Reffold and Billy Cordio—to pull back the curtain on what’s really happening in today’s incident response and threat intelligence landscape. 💡 What we cover: 📈 Real-world ransomware trends (like lo…
…
continue reading

1
DFSP # 487 Unmasking Malicious Activity with 4688
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51
…
continue reading
…
continue reading
…
continue reading

1
Data Intelligence: Breaking Chaos with Kyle DuPont | Ohalo's Innovation in Unstructured Data
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22In this powerful episode, we sit down with Kyle DuPont, CEO and Co-Founder of Ohalo, the trailblazing company reshaping the way organizations understand and manage unstructured data. With deep experience in both finance and technology, including a background at Morgan Stanley, Kyle shares the origin story of Ohalo and how their flagship product, Da…
…
continue reading
This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.
…
continue reading

1
DFSP # 483 Cooking up Forensics with Chef
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.
…
continue reading

1
DFSP # 482 Unlocking Clues from Bash and Hidden Keys
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41This week, we’re pulling back the curtain on SSH from a digital forensics perspective.
…
continue reading